Tag Archives: ::2013

IPv6 seems to have taken a back seat to discussions about more marketing-friendly topics like software defined networking and the Internet of Things. People have said that IPv6 is an integral part of these initiatives and any discussion of them implies IPv6 use. Yet, as I look around at discussions about SDN host routes or NATed devices running home automation for washing machines and refrigerators, I wonder if people really understand the fundamental shift in thinking.

One area that I recently learned has been investing heavily in IPv6 is agriculture. When people think of a farm, they tend to imagine someone in a field with a plow being pulled by a horse. Or, in a more modern environment you might imagine a tractor pulling a huge disc plow across hundreds of acres of fallow land. The reality of faming today is as far removed from the second example as the second example is from the first.

Farming In The East

Modern farmers embrace all kinds of technology to assist in providing maximum yields, both in the western world as well as the east. The biggest strides in information technology assistance for farmers has been in East Asia. Especially in China, a country that has to produce massive amounts of food to feed 1.3 billion people.

Chinese farmers have embraced technologies that allow them to increase productivity. Think about how many tractors are necessary to cultivate the huge amount of land needed to grow food. Each of those tractors now comes equipped with a GPS transmitter capable of relaying exact positioning. This ensures the right land is being worked and the area is ideal for planting certain types of crops. All that telemetry data needs to be accumulated somewhere in order to analyze and give recommendations.

Think also about livestock. In the old days, people hired workers to ensure that livestock didn’t escape or wander away from the herd. It was a process that was both time and labor intensive. With modern technology, those same cattle can be tagged with a small GPS transmitter. A system can poll each animal in a given interval to determine herd count and location. Geofences can be erected to ensure that no animal moves outside of a safe area. When that occurs, alarms can be sent to monitoring stations where a smaller number of farm hands can drive out and rescue the errant animal.

Those two examples alone show the power of integrating traditional agriculture with information technology. However, an unstated problem does exist: Where are we going to get those addresses? We joke about giving addresses to game consoles and television sets and how that’s depleting the global IPv4 pool. What happens when I do the same to dairy farmer’s herd? Even my uncle and his modest dairy years ago had around one hundred cattle in his herd. What happens when your herd is bigger than a /24?

IPv6 Rides To The Rescue

China has already solved this problem. They don’t have any more IPv4 prefixes available. They have to connect their devices. The only answer is IPv6. Tractors can exist as IPv6 endpoints in the monitoring station. They can be tracked globally via monitoring stations. Farm workers and supervisors can determine where the unit is at any given time. Maintenance information can be relayed back to the manufacturer to alert when a part is on the verge of failure. Heavy equipment can stay in working condition longer and be used more efficiently with this type of tracking.

Livestock herds can be monitored for position to ensure they are not trespassing on another farmers land. The same telemetry can be used to monitor vital statistics to discover when animals have become ill. That allows the farm workers to isolate those animals to prevent the herd from contracting illness that will slow production or impact yields. Keeping better track of these animals ensures they will be as productive as possible, whether that be in a dairy case or a butcher shop.

Tom’s Take

I grew up on a farm. I have gathered eggs, bottle fed calves, and milked cows. Two of my uncles owned dairies. The biggest complaint that I’ve heard from them was the lack of information they had on their products. Whether it be a wheat crop or a herd of dairy cattle, they always wanted to know more about their resources. With IPv6, we can start connecting more and more things to the Internet to provide access to the data that’s been locked away for so long, inaccessible to the systems that can provide insight. Advancing technology to the point where a tractor or a bull can have a 2001::/16 address is probably the safest bet a farmer will make in his entire career.

Advertisements

Share this:

Like this:

After my recent articles on Network Computing, I got an email from Fred Baker. To say I was caught off guard was an understatement. We proceeded to have a bit of back and forth about IPv6 deployment by enterprises. Well, it was mostly me listening to Fred tell me what he sees in the real world. I wrote about some of it over on Network Computing.

One thing that Fred mentioned in a paragraph got me thinking. When I heard John Curran of ARIN speak at the Texas IPv6 Task Force meeting last December, he mentioned that the original plan for IPv6 (then IPng) deployment involved rolling it out in parallel with IPv4 slowly to ensure that we had all the kinks worked out before we ran out of IPv4 prefixes. This was around the time the World Wide Web was starting to take off but before RFC 1918 and NAT extended the lifetime of IPv4. Network engineers took a long hard look at the plans for IPv6 and rightfully concluded that it was more expensive to run IPv6 in conjunction with IPv4 and instead it was more time and cost effective to just keep running IPv4 until the day came that IPv6 transition was necessary.

You’ve probably heard me quote my old Intro to Database professor, Dr. Traci Carte. One of my favorite lessons from her was “The only way to motivate people is by fear or by greed.” Fred mentioned that an engineer at an ISP mentioned to him that he wanted to find a way to charge IPv4 costs back to the vendors. This engineer wants to move to a pure IPv6 offering unless there is a protocol or service that requires IPv4. In that case, he will be more than willing to enable it – for a cost. That’s where the greed motivator comes into play. Today, IPv6 is quickly becoming equivalent in cost to IPv4. The increased complexity is balanced out by the lack of IPv4 prefixes.

What if we could unbalance the scales by increasing the cost of IPv4? It doesn’t have to cost $1,000,000 per prefix. But it does have to be a cost big enough to make people seriously question their use of IPv4. Some protocols are never going to be ported to have IPv6 versions. By making the cost of using them higher, ISPs and providers can force enterprises and small-to-medium enterprises (SMEs) to take a long hard look at why they are using a particular protocol and whether or not a new v6-enabled version would be a better use of resources. In the end, cheaper complexity will win out over expensive ease. The people in charge of the decisions don’t typically look at man-hours or support time. They merely check the bottom line. If that bottom line looks better with IPv6, then we all win in the end.

I know that some of you will say that this is a hair-brained idea. I would counter with things like Carrier-Grade NAT (CGN). CGN is an expensive, complicated solution that is guaranteed to break things, at least according to Verizon. Why would you knowingly implement a hotfix to IPv4 knowing what will break simply to keep the status quo around for another year or two? I would much rather invest the time and effort in a scaling solution that will be with us for another 10 years or more. Yes, things my break by moving to IPv6. But we can work those out through troubleshooting. We know how things are supposed to work when everything is operating correctly. Even in the best case CGN scenario we know a lot of things are going to break. And end-to-end communications between nodes becomes one step further removed from the ideal. If IPv4 continuance solutions are going to drain my time and effort they become as costly (or moreso) that implementing IPv6. Again, those aren’t costs that are typically tracked by bean counters unless they are attached to a billable rate or to an opportunity cost of having good engineering talent unavailable for key projects.

Tom’s Take

Dr. Carte’s saying also included a final line about motivating people via a “well reasoned argument”. As much as I love those, I think the time for reason is just about done. We’ve cajoled and threatened all we can to convince people that the IPv4 sky has fallen. I think maybe it’s time to start aiming for the pocketbook to get IPv6 moving. While the numbers for IPv6 adoption are increasing, I’m afraid that if we rest on our laurels that there will be a plateau and eventually the momentum will be lost. I would much rather spend my time scheming and planning to eradicate IPv4 through increased costs than I would trying to figure out how to make IPv4 coexist with IPv6 any longer.

Share this:

Like this:

Every time I sit down to watch a TV show or movie and they mention computers or hacking, I get amused. I know that I’m probably going to see some attempt to make computer hacking look cool or downright scary. Whether it be highly stylized like Hackers or fairly accurate like the power plant hack in The Matrix Reloaded, there are always little details that get glossed over. In many cases, one of these is the IP addressing of the systems themselves. If the producers and writers of the film even choose to show an IP address on the screen, it’s usually so wrong that I laugh at a totally inappropriate moment of drama.

The practice of using fictitious numbering schemes for things in entertainment goes back several decades. The first known instance of a movie using a fake number for something was in Panic in Year Zero back in 1962. For the first time, the writers used a fictitious phone number starting with 555 instead of a real telephone number. Even though 555 prefixes were used for things like directory assistance, they weren’t widely deployed. As such, the 555 prefix became synonymous with a “fake” phone number. 555-0100 through 555-0199 are the only official numbers in that range set aside for fictitious use, however many people still associate that prefix with a phone number that won’t work in the real world.

Hollywood has been trying for some time to come up with IP addresses that look real enough to pass the sniff test but are totally false. Sometimes that works. Other times, you end up with Law and Order. In particular, the SVU flavor of that show has been known to produce IP address ranges that don’t even come close to looking real. This page documents a couple of the winners from that show when the police start tracing an offender by their IP address. Some of them look almost real. Others seem to have an octet that jumps above 255. Still others have 4-digit octets or other oddities that don’t quite measure up. Sure, it heightens the suspense when people can see what the detectives are doing, but for those of us that know enough to be dangerous, it pulls you out of the moment. It would be like watching ER and hearing the doctors start talking about brain surgery, only to start cutting open a patient’s arm to get to it.

TCP/IP has a large number of address ranges that can be used in a fictitious manner. For instance, Class E experimental addresses (240.0.0.0/4) were set aside and hard coded into most OSes as unavailable. The address range for example use and documentation purposes 192.0.2.0/24 can also serve as a safe fictitious range. Then there’s RFC 1918. These addresses are used for private network ranges and must be NATed to work correctly on the public internet due to their non-routability. These would be perfect for use in movies, as they represent networks that most people use daily. They would look believable to those of us that know what to look for. However, I think the producers and writers avoid doing that because of the inherent curiosity of people.

The greatest example of this comes courtesy of Tommy Tutone. The band hit radio gold with their song “867-5309/Jenny” back in 1982. Unlike 555, 867 is a widely used prefix code in the North American Numbering Plan (NANP). There are numerous stories of people that have received that phone number and been cursed with popularity. One story from Brown university tells of unsuspecting freshmen that move into the dorm room with that telephone number. The phone calls never stop until a request is made to shut down the line. Even back in 1982, the regional Bell companies were seeing huge spikes in telephone calls to that one number. In many cases, they had to disconnect it in order to keep the traffic to a reasonable level. If you’re curious, you can hear some of the messages left for the unfortunate possessors of that cursed number over at http://www.jennynetwork.com

People are compelled to try things they see in movies. This article in the Chicago Tribune talks about the writer memorizing a realistic looking number from a movie and going home to call it several times before giving up. The movie Magnolia included the real number 877-TAME-HER which the movie studio used to record Tom Cruise giving an in-character speech about his system for the purposes of marketing. That’s all well and good in the real world when someone gets a few occasional prank calls or other harmless issues. What happens in a computer network when someone sees a 10.0.0.0/8 address on TV and then decides to try and hack it? What if they call the police and say that the computer address of a murder or a predator is on their network? This can cause huge issues for network admins. The nightmare of trying to explain to people that just because the Gibson in Hackers 3 is at 192.168.1.2 doesn’t mean they get to assault the mail server every day would get old really fast. And when it comes to IPv6, the opportunity for even more trouble arises.

I was a long-time player of the MMORPG City of Heroes. One of the reasons that I liked playing it so much was the lore and back story to the world. I was one of the players that read all of the fluff text to get a better sense of what the writers were trying to do. Imagine my surprise when I was playing a new mission a several months ago and ran across a little Easter egg. One of the writers decided that the imaginary world of Paragon City had long ago ran out of IPv4 addresses and decided to upgrade to IPv6. One of the consoles in the game had a reference to an IPv6 address – 3015:db6:97c4:9e1:2420:9b3f:073:8347. I was excited. Finally, someone in the entertainment industry realized we were running out of IPv4! Then I started thinking. Right now, the allocations to the RIRs all start with 2001. Eventually, once we get the intergalactic Internet up and running, we might end up getting into the 3000 range. It might be a hundred years before the address above is allocated to someone. By then, most everyone will have forgotten City of Heroes ever existed. Putting real IPv6 addresses in movies and on TV does run the risk of having people “hacking the Gibson” when you least expect it. I think you’ll see that even in those far-flung ranges, the odds of a fake address on TV coinciding with a real IPv6 server or workstation address, even on a global scale, is pretty slim. Despite the fact that all our systems will be globally reachable, the IPv6 address space is so large that no two systems are likely to even overlap. Add in neighbor discovery, duplicate address detection, and the uniqueness of a MAC address (which forms the basis of EUI-64 addressing and SLAAC) and you can see how difficult it would be.

Tom’s Take

In case the name of my blog didn’t warn you…I’m a nerd. When I see something inaccurate in a movie, I tend to point it out. That’s why I don’t watch Armageddon any more. I understand that writers and directors are trying to entertain people. When you’re trying to do that, sometimes the details get sacrificed for the sake of telling a good story. However, when it comes to something that can represented easily for the most realistic look possible, the creative team involved should do that. Whether it be the night sky in Titanic or the address of the mainframe in a techno thriller, I want the people that care about the production values of a movie to show me how much they care. With the advent of IPv6, I think creating fake addresses to put in movies and other entertainment will be easier. Given the vast range of available space it doesn’t take too much effort to pull out something “techy sounding” to put in a movie script. Trust me, the nerds out there will thank you for it.

Share this:

Like this:

It’s been 366 days since my last post about goals for 2012. How’d I do on my list for the past year?

1. Juniper – Dropped the ball on this one. I spent more time seeing Juniper gear being installed all over the place and didn’t get my opportunity to fire up the JNCIA-Junos liked I wanted. I’m planning to change all that sooner rather than later. Doug Hanks even gave me a good head start on immersion learning of the MX Series.

2. Data Center – I did get a little more time on some Nexus gear, but not nearly enough to call it good for this goal. Every time I sat down to start looking at UCS, I kept getting pulled away on some other project. If the rumblings I’m hearing in the DC arena are close to accurate, I’m going to wish I’d spent more time on this.

3. Advanced Virtualization – While I didn’t get around to taking either of the VCAP tests in 2012, I did spend some more time on virtualization. I was named a vExpert for 2012, gave a virtualization primer presentation, and even attended my first VMUG meeting. I also started listening to the vBrownBag podcast put on by ProfessionalVMware. They have a ton of material that I’m going to start reviewing so I can go out and at least take the DCD test soon.

4. Moving to the Cloud – Ah ha! At last something that I nailed. I moved a lot of my documents and data into cloud-based storage. I leveraged Dropbox, Skydrive, and Google Docs to keep my documentation consistent across multiple platforms. As I continue forward, I’m going to keep storing my stuff in the big scary cloud so I can find it whenever I need it.

Looks like I’ve got two fails, one tie, and one win. Still not the 50% that I had hoped for, but it’s funny how real life tends to pull you in a different direction that you anticipate. Beyond attending a few more Tech Field Day events and Cisco Live, I also attended a Cisco Unified Communications Partner Beta Training launch event and the Texas IPv6 Task Force Winter Summit. It was this last event that really got me thinking about what I wanted to do in the coming year.

I think that 2013 is going to be a huge year for IPv6 adoption on the Internet. We’ve been living in the final depletion phase of IPv4 for a whole year now. We can no longer ignore the fact that IPv6 is the future. I think the major issue with IPv6 adoption is getting the word out to people. Some of the best and brightest are doing their part to talk to people about enabling IPv6. The Texas IPv6 Task Force meeting showed me that a lot of great people are putting in the time and effort to try and drive people into the future. However, a lot of this discussion is happening outside of people’s view. Mailing lists aren’t exactly browsing-friendly. Not everyone can drop what they’re doing for a day or two to go to a task force meeting. However, people do have the spare time to read a blog post on occasion. That’s where I come in.

In 2013, I’m going to do my part to get the word out about IPv6. I’m going to spend more time writing about it. I’m going to write posts about enabling it on all manner of things. Hypervisors, appliances, firewalls, routers, and even desktops are on the plate. I want to take the things I’m learning about IPv6 and apply them to the world that I work in. I don’t know how service providers are going to to enable IPv6. However, I can talk about enabling CallManager to use IPv6 and register IP phones without IPv4 addresses. I can work out the hard parts and the gotchas so that you won’t have to. I’ve already decided that any presentation that I give in 2013 will be focused on IPv6. I’ve already signed up for one slot later in the year with a possibility of having a second. I applied for a presentation slot at the Rocky Mountain IPv6 Task Force meeting in April. I want to hone my skills talking to people about IPv6. I’m also going to try and make a lot more blog posts about IPv6 in the coming year. I want to take away all the scary uncertainty behind the protocol and make it more agreeable to people that want to learn about it without getting scared off by the litany of RFCs surrounding it. To that end, I’m going to start referring to this year as ::2013. The more we get familiar with seeing IPv6 notation in our world, the better off we’ll be in the long run. Plus, it gives me a tag that I can use to show how important IPv6 is to me.

A shorter set of goals this year doesn’t mean a more modest one. Focus is a good thing in the long run for me. Being an agent of change when it comes to IPv6 is something that I’m passionate about. Sure, I’m still going to make the occasional NAT post. I may even have some unnice things to say about vendors and IPv6 support. The overall idea is that we keep the discussion focused on moving forward and making IPv6 more widely adopted. It’s the least I can do to try and leave my mark on the Internet in some other way besides posting cat pictures or snarky memes. It’s also a goal that is going to keep progressing and never really be finished until the lights are turned out on the last IPv4 webserver out there. Until that fateful day, here’s hoping that ::2013 is a good year for all.